Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"
☆31Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for MalPurifier
Users that are interested in MalPurifier are comparing it to the libraries listed below
Sorting:
- ☆18Apr 4, 2021Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 2 years ago
- ☆42Aug 6, 2021Updated 4 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Apr 24, 2020Updated 5 years ago
- Traffic-Analysis-Base-DPDK☆140Apr 2, 2025Updated 11 months ago
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- 📘 海南大学飞跃手册☆64Feb 4, 2025Updated last year
- A Federated Learning based Android Malware Classification System☆28Feb 15, 2024Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Sep 17, 2025Updated 5 months ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆14Apr 1, 2025Updated 11 months ago
- 重庆大学新教务网成绩查询,单点登录☆11Mar 7, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- 《算法竞赛入门经典》第二版(第2版)-例题习题解答☆10May 10, 2021Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- This course is published by Packt Publishing☆22Aug 2, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆13Dec 5, 2022Updated 3 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- Windows IOCP + 线程池 高并发Socket通信框架☆10Apr 20, 2019Updated 6 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- Framework for testing the reachability of native functions in Android applications.☆11Aug 30, 2023Updated 2 years ago
- A unique security module for the Linux operating system☆12Sep 17, 2024Updated last year